Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2024, 14:36
Static task
static1
Behavioral task
behavioral1
Sample
3ecc7ead7292780c4b982276f3605533.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ecc7ead7292780c4b982276f3605533.exe
Resource
win10v2004-20231215-en
General
-
Target
3ecc7ead7292780c4b982276f3605533.exe
-
Size
158KB
-
MD5
3ecc7ead7292780c4b982276f3605533
-
SHA1
02bc1f1ec71b76a6fbc3a967eee2f5ba28c6b3eb
-
SHA256
bcf7e33a1edbc1625eb9d6b5d96aa3c1dc2ca12b1114ea365d84c562bc62309b
-
SHA512
3f6c0cbb7764e4159dee8aa4f3fb0395494356bd1b542bec15236827cd10dfac4854b605d513a01dba8fa259ac4b207e844893adec7d978674afc75471c0b288
-
SSDEEP
1536:lBAMrUUxCuq22G0qaODOjBjfXZOCQLz7YX:fJwjODKZgL
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 3ecc7ead7292780c4b982276f3605533.exe -
resource yara_rule behavioral2/memory/4292-1-0x0000000000400000-0x0000000000483000-memory.dmp upx behavioral2/memory/4292-2-0x0000000000400000-0x0000000000483000-memory.dmp upx behavioral2/memory/4292-4-0x0000000000400000-0x0000000000483000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4292 3ecc7ead7292780c4b982276f3605533.exe 4292 3ecc7ead7292780c4b982276f3605533.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4292 wrote to memory of 3084 4292 3ecc7ead7292780c4b982276f3605533.exe 93 PID 4292 wrote to memory of 3084 4292 3ecc7ead7292780c4b982276f3605533.exe 93 PID 4292 wrote to memory of 3084 4292 3ecc7ead7292780c4b982276f3605533.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ecc7ead7292780c4b982276f3605533.exe"C:\Users\Admin\AppData\Local\Temp\3ecc7ead7292780c4b982276f3605533.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\a..bat" > nul 2> nul2⤵PID:3084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5aa908d37cd15efaac3136433501a666b
SHA15bd5fc054d119ed53d22e3845f0f8aa045134a93
SHA2567ca0e2c67058e6943312192172a2b376e2db1af1e6169067b31614946e239bd3
SHA51270c4c5017848fa1b44600cec55a67ebaa11abb00cf95252436120d0f739a4f9bf634e3b7bbb4bf7f9faed5a341b7abcf5992c058fc26e706721e7a0eaea5b64b